Time
2 hours 42 minutes
Difficulty
Beginner
CEU/CPE
3

Video Transcription

00:00
Hello and welcome to the office. 3 65 migration primer course.
00:05
Miami's Jim Daniels and on your instructor
00:08
Today we're starting model for stains on, and we're gonna go over the exchange on overview.
00:15
In today's lesson. We're going to go over permissions. In exchange. Talked to Mel. Boss is available in exchange security and compliance features monitoring, auditing tools and Mel Flow options for exchange alarm,
00:30
Extend Salon and essential Improve Used role based access control that he's that is a for Mr Model or back.
00:38
Each roll group has a set of pre defined permissions.
00:42
New role groups can be created and customized as needed for the organization.
00:47
One thing. Keeping modeling permissions
00:49
the tenant Global admin is also, by default the exchange online admin.
00:56
Here's some of the commonly used role groups in exchange, along with help desk.
01:00
The key thing about the help desk Robur is they can view or modify. I open the Web options for all users.
01:08
Discovery Management.
01:10
Think of this as compliant settings. You can run searches on mailbox,
01:15
so if you ever need to do any sort of open records, you discovery any of that. The Discovery management role was needed organizational management.
01:26
That's admin over change, along with the exception of Discovery.
01:30
So if you want somebody tohave
01:33
exchangeable on admin roles, but you don't want them involved in searches and running different compliance configuration settings give them organizational management role
01:45
recipient management role.
01:47
These users can create or modify exchange align recipients.
01:52
Pretty sure you four on that one. Records management.
01:55
These users can configure compliance settings and mel flow rules, so Discovery Management they can configure compliance settings. Records management conduce that, plus Mel Floral Records management does not have the ability to run the searches of services in the mailbox
02:13
view. Only organizational management.
02:15
They can view the properties of any exchange of one object. This is the look, but don't touch kind of roll over.
02:23
Let's take a look at some of the roles and exchange alarm.
02:27
So let's look at the recipient management who can see the individual rules that compose
02:32
this room.
02:35
My team mailboxes, for example.
02:38
Now let's look at adding in your old Bert,
02:44
you set scope and set individual roles.
02:46
Here we can kind of pick and choose what roles we want this custom roll group to have the ability to perform,
03:02
and we're going to choose address list.
03:07
We could give it a name.
03:08
Schoop's default, and now we can add a member
03:14
to assign that role to
03:16
We're going to take a member Paisley.
03:21
So now she will be assigned to this role
03:24
hit a basis. Settings.
03:28
There we are
03:31
the tops of exchange, Alana recipients that you'll have availability is a user group Resource shirt, no box and public folders.
03:42
Use a recipient is a user mailbox or mail contact. A Mel contact is Mel enabled directory object that has a external email address.
03:52
A lot of times, people will do this if they have a non hosted or third party email address for a certain user or a person important within their directory will create a Mel. Contact said That way there that appears in the address list
04:09
glued recipient types.
04:11
You have a distribution group that sends an email to each member of the group dynamic distribution. The same is the distribution, said Membership is based on a query.
04:20
Mellon Able Security
04:23
is a distribution group,
04:25
and you can assign resources to it.
04:28
Unifying group That's a combined collaborative tools with a destro shared hybrid type mailbox Unified Group that is a newer office. 3 65 Cloud based Bert.
04:42
Here's a comparison for some of the groups that we just went over.
04:46
You see distributes messages to members. All of them do that. The unified group that doesn't if they're subscribed to that group.
04:55
If not, they will have to go and see those messages in the room.
05:00
New member See historical messages distribution. You only see what was sent to the address from the moment you joined
05:09
Unified Group. You can actually see everything all communications and conversations that happened prior to the members online.
05:17
Does it come with a group calendar?
05:19
The unified group does
05:21
the others simple distribution groups and do not
05:25
So users or group members are manually added. That will be yes. With the exception of dynamic Destroyed.
05:31
There is a new feature with a unified group where you can do a unified group based on a dynamic as a raid. Eager
05:40
the resource recipient type.
05:43
This is a special kind of mailbox has customizable logic, which does open booking approval. You prevent double booking, can't even say your booking time.
05:54
The two common resource recipient boxes or is a room mailbox and equipment mailbox, so room mailboxes assigned to specific location. And this is how most organizations keep track of who books, what room, what conference room at what time
06:12
shared mailboxes.
06:15
That is when multiple users share a common mailbox and exchange calendar. The users act as delegates. Access is based on the delegation list. It is not have a password.
06:27
Compliance settings can be applied to share mailboxes.
06:30
The big thing will share mailboxes is they don't consume an extra license,
06:36
and there are no passwords.
06:39
So again, a user does not have to remember a second password just to access a non user type of mailbox. Public folders that's a shared access with the easy way to collect, organize and sharing info with a reward group or organization
06:53
has a limited functionality without looking to let on the Web.
06:56
It does not provide some of the functions that SharePoint does. My opinion is,
07:01
unless you absolutely, for a reason require a public voter. I would not migrate them,
07:06
and I would not create them. In exchange on, I will go exclusively with SharePoint and a unified group. If you need this type of work environment
07:16
so get some of the consecutively and compliance features with change online.
07:20
Some of the features available. You have encryption litigation, whole journaling, archive mailboxes, content serves and data loss prevention for encryption. TLS 1.2 is used as a standard encryption during transit. Bit Locker is used in with that at risk in the market. Self Data Centers
07:41
BET Locker, you know, Laws A S to 56 bit. Standard
07:45
additional options you have for encryption s mine Secure Multipurpose Internet Mel of sessions and over the ME office message. Encryption
07:56
office message Encryption combines email, encryption and rights management capabilities.
08:01
It does a complete encryption identity and authorization model
08:05
To use office message encryption. You have to have some form of as your information protection,
08:11
which is available in the Enterprise and Mobility Security Sweets or you quarrel. License has to be a E three or higher.
08:20
All users have the ability to open a office message. Encrypted message is to create that you have to have a certain licence.
08:31
There's a diagram that looks at message encryption within Officer 65.
08:35
Yet the sender.
08:37
When they send something, it goes through the policies and the rules
08:41
if it triggers one. The Rose and force
08:46
the tenant configuration data and key
08:50
is attached to it.
08:50
It does it a recipient.
08:52
When the recipient receives it. They view a sandbox messaging portal,
08:58
and they can either authenticate with their existing Microsoft account office 3 65 organizational account, love dot com account or another Federated accounts such as gmail dot com.
09:11
For this quiz, I would like to know what is encryption standard used by Officer 65 for messages and transit.
09:20
Is it triple? Does TLS one own TLS 12 or bluefish?
09:30
The correct answer is TLS one to litigation. Hold
09:33
the litigation. Whole retains all content in the mailbox Thoma hold until the holy ends.
09:39
So even if a user device a message
09:41
if their boss is under hold, it still stored in a special folder for Discovery.
09:46
It requires exchange plan to
09:48
which comes with the core E three and E five exchange licenses.
09:54
Litigation holds a valuable troubleshooting tool. If you're doing something toe where you may
10:01
negatively impact the integrity of the mailbox or in May delete messages where you may place it in, a unrecoverable state is always recommended to take that user make sure they're assigned 83 or 85 put their mailbox on litigation whole prior to taking those troubleshooting steps.
10:20
Litigation hold has got me out of many jams.
10:24
Content search. So continents are replaced. Each discovery. When Office 3 65 in exchange along, first came out, he discovery Was there
10:33
constant search ISMM or of a unified discovery search? It searches across the entire tenant,
10:39
so not only exchangeable on it also rolls into SharePoint one drive teams.
10:45
You can start about query, keywords and different actually values.
10:48
It is part of the Security and Compliance Center,
10:52
and Cory five comes with advanced discovery features. So content search
10:58
works all across the board. On all user level level types. However, Cory five has some additional discovery features.
11:07
Data loss prevention. That's a huge buzz work right about now.
11:11
And let's take a look at what type of deal P configuration options that exchange Alon Officers, 65 has
11:20
with the deal p. In exchange along, you can apply policies and actions
11:26
to those messages containing sensitive information
11:30
you can use. A Microsoft template will create your own for a customization.
11:33
Mel Tips of Arad action justifications of some of the options,
11:37
and they are applied with Mel Floyd. Rules for DLP requires exchange plan to which is Courtney 3 35
11:46
in a new unified DLP models coming to Security Compliance center.
11:50
So they're taking the deal. P. And they are using those protection and prevention policies, and they're extending the out from Just exchange a lot, just like with E Discovery, where went to content search deal peas doing the same thing. It's going to be a unified engine that runs
12:09
across all of your
12:11
3 65 10
12:13
for monitoring and our parting tools.
12:18
We have some admin logging. They, uh, audit in log e change may bind at man mailbox logging when the mailboxes access
12:28
their basic artists with an exchange online and in center.
12:31
There's unified artists in the Security and Compliance Center
12:35
to Cloud. Have security broker. I could do an entire lesson. Just on this is a comprehensive a p R. Driven discovery in activity log sweet.
12:46
It comes with the enterprise mobility and security lessons.
12:50
Corti five. Or you can get the cloud of security broker added Alicorp. You see here from the screen shot, we have
12:58
it really gets into detail.
13:01
One events. So with this one here, you can see that they move messages to delete items folder. You can see the person i p the date device type.
13:13
You see a whole slew of information that it really helps you paint the total picture of what happens within your ex angel on environment.
13:22
Melford transport rules.
13:24
These are triggered based on certain message parameters.
13:28
If then logic is used and you can customize the triggers in the actions
13:33
the lazy exchange Admin loves transport rules
13:37
because you can use them to minute
13:41
features.
13:41
You can use him to mimic policies that will be in a security compliance center,
13:46
and it seems a lot
13:48
so one of my challenges to U as an exchange, Alon Man Strader is
13:54
to always look at out of the box
13:58
and look at policies. Procedure tools such as deal P
14:03
content, search and things in your security compliant center. Always look there first, so you aren't creating
14:11
a rule that you can already manage with a feature that's available,
14:16
you can use the mail for the transport rules for really creative solutions.
14:20
So in recap,
14:22
standard encryption for change on on includes TLS 1.2 in transit and Built locker wishes the data at rest.
14:31
For all of messages,
14:33
various recipient types are available. We talk about different groups. We're talking about users. Resource boxes share mailboxes.
14:41
Additional security and compliance tools are available,
14:45
depending on your licensing. So again, this is the cost. Forces benefit dependent When you're Lawson's in your environment. Mayor Main It may or may not make sense to immediately add and a possibility and security so you can get that extra security compliance that your organization may require.
15:03
Like to thank you for taking time out of your schedule to join me
15:09
on this class. And I hope to see you with the next one. Thank you.

Up Next

Office 365 Migration

In this Office 365 migration training, we look at the migration processes involved with Office 365 including preparation, identity configuration and Exchange, SharePoint and OneDrive migrations. Multiple scenarios are covered with supported migration techniques.

Instructed By

Instructor Profile Image
Jim Daniels
IT Architect
Instructor